blob: 804222ce4e03acad0e9e9543b7ad525f0d223c9a [file] [log] [blame]
drh65da2852018-10-27 00:47:33 +00001/*
2** 2018-10-26
3**
4** The author disclaims copyright to this source code. In place of
5** a legal notice, here is a blessing:
6**
7** May you do good and not evil.
8** May you find forgiveness for yourself and forgive others.
9** May you share freely, never taking more than you give.
10**
11*************************************************************************
12**
13** This program is designed for fuzz-testing SQLite database files using
14** the -fsanitize=fuzzer option of clang.
15**
16** The -fsanitize=fuzzer option causes a main() to be inserted automatically.
17** That main() invokes LLVMFuzzerTestOneInput(D,S) to be invoked repeatedly.
18** Each D is a fuzzed database file. The code in this file runs various
19** SQL statements against that database, trying to provoke a failure.
20**
21** For best results the seed database files should have these tables:
22**
23** Table "t1" with columns "a" and "b"
24** Tables "t2" and "t3 with the same number of compatible columns
25** "t3" should have a column names "x"
26** Table "t4" with a column "x" that is compatible with t3.x.
27**
28** Any of these tables can be virtual tables, for example FTS or RTree tables.
29**
30** To run this test:
31**
32** mkdir dir
33** cp dbfuzz2-seed*.db dir
34** clang-6.0 -I. -g -O1 -fsanitize=fuzzer \
35** -DTHREADSAFE=0 -DSQLITE_ENABLE_DESERIALIZE \
36** -DSQLITE_ENABLE_DBSTAT_VTAB dbfuzz2.c sqlite3.c -ldl
37** ./a.out dir
38*/
39#include <assert.h>
40#include <stdio.h>
41#include <stdlib.h>
42#include <string.h>
43#include <stdarg.h>
44#include <ctype.h>
45#include <stdint.h>
drh7e85e902019-02-20 19:06:16 +000046#ifndef _WIN32
drh8ed07d12019-01-20 00:03:59 +000047#include <sys/time.h>
48#include <sys/resource.h>
drh7e85e902019-02-20 19:06:16 +000049#endif
drh65da2852018-10-27 00:47:33 +000050#include "sqlite3.h"
51
52/*
53** This is the is the SQL that is run against the database.
54*/
55static const char *azSql[] = {
56 "PRAGMA integrity_check;",
57 "SELECT * FROM sqlite_master;",
58 "SELECT sum(length(name)) FROM dbstat;",
59 "UPDATE t1 SET b=a, a=b WHERE a<b;",
drhd811d842018-10-27 21:06:44 +000060 "ALTER TABLE t1 RENAME TO alkjalkjdfiiiwuer987lkjwer82mx97sf98788s9789s;",
drh65da2852018-10-27 00:47:33 +000061 "INSERT INTO t3 SELECT * FROM t2;",
62 "DELETE FROM t3 WHERE x IN (SELECT x FROM t4);",
drhd811d842018-10-27 21:06:44 +000063 "REINDEX;",
drh65da2852018-10-27 00:47:33 +000064 "DROP TABLE t3;",
65 "VACUUM;",
66};
67
drhd811d842018-10-27 21:06:44 +000068/* Output verbosity level. 0 means complete silence */
69int eVerbosity = 0;
70
drh1972c8c2019-01-11 14:38:47 +000071/* True to activate PRAGMA vdbe_debug=on */
72static int bVdbeDebug = 0;
73
drh178edcd2019-01-22 16:11:31 +000074/* Maximum size of the in-memory database file */
75static sqlite3_int64 szMax = 104857600;
76
drhfb556712019-03-22 11:38:14 +000077/* Progress handler callback data */
78static int nCb = 0; /* Number of callbacks seen so far */
79static int mxCb = 250000; /* Maximum allowed callbacks */
80
drha7908822019-02-04 19:50:44 +000081/***** Copy/paste from ext/misc/memtrace.c ***************************/
82/* The original memory allocation routines */
83static sqlite3_mem_methods memtraceBase;
84static FILE *memtraceOut;
85
86/* Methods that trace memory allocations */
87static void *memtraceMalloc(int n){
88 if( memtraceOut ){
89 fprintf(memtraceOut, "MEMTRACE: allocate %d bytes\n",
90 memtraceBase.xRoundup(n));
91 }
92 return memtraceBase.xMalloc(n);
93}
94static void memtraceFree(void *p){
95 if( p==0 ) return;
96 if( memtraceOut ){
97 fprintf(memtraceOut, "MEMTRACE: free %d bytes\n", memtraceBase.xSize(p));
98 }
99 memtraceBase.xFree(p);
100}
101static void *memtraceRealloc(void *p, int n){
102 if( p==0 ) return memtraceMalloc(n);
103 if( n==0 ){
104 memtraceFree(p);
105 return 0;
106 }
107 if( memtraceOut ){
108 fprintf(memtraceOut, "MEMTRACE: resize %d -> %d bytes\n",
109 memtraceBase.xSize(p), memtraceBase.xRoundup(n));
110 }
111 return memtraceBase.xRealloc(p, n);
112}
113static int memtraceSize(void *p){
114 return memtraceBase.xSize(p);
115}
116static int memtraceRoundup(int n){
117 return memtraceBase.xRoundup(n);
118}
119static int memtraceInit(void *p){
120 return memtraceBase.xInit(p);
121}
122static void memtraceShutdown(void *p){
123 memtraceBase.xShutdown(p);
124}
125
126/* The substitute memory allocator */
127static sqlite3_mem_methods ersaztMethods = {
128 memtraceMalloc,
129 memtraceFree,
130 memtraceRealloc,
131 memtraceSize,
132 memtraceRoundup,
133 memtraceInit,
134 memtraceShutdown
135};
136
137/* Begin tracing memory allocations to out. */
138int sqlite3MemTraceActivate(FILE *out){
139 int rc = SQLITE_OK;
140 if( memtraceBase.xMalloc==0 ){
141 rc = sqlite3_config(SQLITE_CONFIG_GETMALLOC, &memtraceBase);
142 if( rc==SQLITE_OK ){
143 rc = sqlite3_config(SQLITE_CONFIG_MALLOC, &ersaztMethods);
144 }
145 }
146 memtraceOut = out;
147 return rc;
148}
149
150/* Deactivate memory tracing */
151int sqlite3MemTraceDeactivate(void){
152 int rc = SQLITE_OK;
153 if( memtraceBase.xMalloc!=0 ){
154 rc = sqlite3_config(SQLITE_CONFIG_MALLOC, &memtraceBase);
155 if( rc==SQLITE_OK ){
156 memset(&memtraceBase, 0, sizeof(memtraceBase));
157 }
158 }
159 memtraceOut = 0;
160 return rc;
161}
162/***** End copy/paste from ext/misc/memtrace.c ***************************/
163
drhfb556712019-03-22 11:38:14 +0000164/*
165** Progress handler callback
166**
167** Count the number of callbacks and cause an abort once the limit is
168** reached.
169*/
170static int progress_handler(void *pNotUsed){
171 nCb++;
172 if( nCb<mxCb ) return 0;
173 if( eVerbosity>=1 ){
174 printf("-- Progress limit of %d reached\n", mxCb);
175 }
176 return 1;
177}
178
drhd811d842018-10-27 21:06:44 +0000179/* libFuzzer invokes this routine with fuzzed database files (in aData).
180** This routine run SQLite against the malformed database to see if it
181** can provoke a failure or malfunction.
182*/
drh65da2852018-10-27 00:47:33 +0000183int LLVMFuzzerTestOneInput(const uint8_t *aData, size_t nByte){
184 unsigned char *a;
185 sqlite3 *db;
186 int rc;
187 int i;
drh178edcd2019-01-22 16:11:31 +0000188 sqlite3_int64 x;
drh88862d42019-02-04 19:45:26 +0000189 char *zErr = 0;
drh65da2852018-10-27 00:47:33 +0000190
drhd811d842018-10-27 21:06:44 +0000191 if( eVerbosity>=1 ){
192 printf("************** nByte=%d ***************\n", (int)nByte);
193 fflush(stdout);
194 }
drh62a88292018-12-07 03:01:07 +0000195 if( sqlite3_initialize() ) return 0;
drhad9bfa52018-10-30 15:20:35 +0000196 rc = sqlite3_open(0, &db);
drh65da2852018-10-27 00:47:33 +0000197 if( rc ) return 1;
drhad9bfa52018-10-30 15:20:35 +0000198 a = sqlite3_malloc64(nByte+1);
drh65da2852018-10-27 00:47:33 +0000199 if( a==0 ) return 1;
200 memcpy(a, aData, nByte);
201 sqlite3_deserialize(db, "main", a, nByte, nByte,
202 SQLITE_DESERIALIZE_RESIZEABLE |
203 SQLITE_DESERIALIZE_FREEONCLOSE);
drh178edcd2019-01-22 16:11:31 +0000204 x = szMax;
drhddc28c22019-02-26 18:21:08 +0000205#ifdef SQLITE_FCNTL_SIZE_LIMIT
drh178edcd2019-01-22 16:11:31 +0000206 sqlite3_file_control(db, "main", SQLITE_FCNTL_SIZE_LIMIT, &x);
drhddc28c22019-02-26 18:21:08 +0000207#endif
drh1972c8c2019-01-11 14:38:47 +0000208 if( bVdbeDebug ){
209 sqlite3_exec(db, "PRAGMA vdbe_debug=ON", 0, 0, 0);
210 }
drhfb556712019-03-22 11:38:14 +0000211 if( mxCb>0 ){
212 sqlite3_progress_handler(db, 10, progress_handler, 0);
213 }
drhe6e96b12019-08-02 21:03:24 +0000214#ifdef SQLITE_TESTCTRL_PRNG_SEED
drh2e6d83b2019-08-03 01:39:20 +0000215 sqlite3_test_control(SQLITE_TESTCTRL_PRNG_SEED, 1, db);
drhe6e96b12019-08-02 21:03:24 +0000216#endif
drh65da2852018-10-27 00:47:33 +0000217 for(i=0; i<sizeof(azSql)/sizeof(azSql[0]); i++){
drhd811d842018-10-27 21:06:44 +0000218 if( eVerbosity>=1 ){
219 printf("%s\n", azSql[i]);
220 fflush(stdout);
221 }
drh88862d42019-02-04 19:45:26 +0000222 zErr = 0;
drhfb556712019-03-22 11:38:14 +0000223 nCb = 0;
drh88862d42019-02-04 19:45:26 +0000224 rc = sqlite3_exec(db, azSql[i], 0, 0, &zErr);
225 if( rc && eVerbosity>=1 ){
226 printf("-- rc=%d zErr=%s\n", rc, zErr);
227 }
228 sqlite3_free(zErr);
drh65da2852018-10-27 00:47:33 +0000229 }
drhad9bfa52018-10-30 15:20:35 +0000230 rc = sqlite3_close(db);
231 if( rc!=SQLITE_OK ){
232 fprintf(stdout, "sqlite3_close() returns %d\n", rc);
233 }
drhd811d842018-10-27 21:06:44 +0000234 if( sqlite3_memory_used()!=0 ){
drhad9bfa52018-10-30 15:20:35 +0000235 int nAlloc = 0;
236 int nNotUsed = 0;
237 sqlite3_status(SQLITE_STATUS_MALLOC_COUNT, &nAlloc, &nNotUsed, 0);
238 fprintf(stderr,"Memory leak: %lld bytes in %d allocations\n",
239 sqlite3_memory_used(), nAlloc);
drhd811d842018-10-27 21:06:44 +0000240 exit(1);
241 }
242 return 0;
243}
244
drh1972c8c2019-01-11 14:38:47 +0000245/*
246** Return the number of "v" characters in a string. Return 0 if there
247** are any characters in the string other than "v".
248*/
249static int numberOfVChar(const char *z){
250 int N = 0;
251 while( z[0] && z[0]=='v' ){
252 z++;
253 N++;
254 }
255 return z[0]==0 ? N : 0;
256}
257
drhd811d842018-10-27 21:06:44 +0000258/* libFuzzer invokes this routine once when the executable starts, to
259** process the command-line arguments.
260*/
261int LLVMFuzzerInitialize(int *pArgc, char ***pArgv){
drh1972c8c2019-01-11 14:38:47 +0000262 int i, j, n;
drhd811d842018-10-27 21:06:44 +0000263 int argc = *pArgc;
drhd811d842018-10-27 21:06:44 +0000264 char **argv = *pArgv;
drhd811d842018-10-27 21:06:44 +0000265 for(i=j=1; i<argc; i++){
266 char *z = argv[i];
267 if( z[0]=='-' ){
268 z++;
269 if( z[0]=='-' ) z++;
drh1972c8c2019-01-11 14:38:47 +0000270 if( z[0]=='v' && (n = numberOfVChar(z))>0 ){
271 eVerbosity += n;
272 continue;
273 }
274 if( strcmp(z,"vdbe-debug")==0 ){
275 bVdbeDebug = 1;
drhd811d842018-10-27 21:06:44 +0000276 continue;
277 }
drhfb556712019-03-22 11:38:14 +0000278 if( strcmp(z,"limit")==0 ){
279 if( i+1==argc ){
280 fprintf(stderr, "missing argument to %s\n", argv[i]);
281 exit(1);
282 }
283 mxCb = strtol(argv[++i], 0, 0);
284 continue;
285 }
drha7908822019-02-04 19:50:44 +0000286 if( strcmp(z,"memtrace")==0 ){
287 sqlite3MemTraceActivate(stdout);
288 continue;
289 }
290 if( strcmp(z,"mem")==0 ){
291 bVdbeDebug = 1;
292 continue;
293 }
drh178edcd2019-01-22 16:11:31 +0000294 if( strcmp(z,"max-db-size")==0 ){
295 if( i+1==argc ){
296 fprintf(stderr, "missing argument to %s\n", argv[i]);
297 exit(1);
298 }
299 szMax = strtol(argv[++i], 0, 0);
300 continue;
301 }
drh7e85e902019-02-20 19:06:16 +0000302#ifndef _WIN32
drh59765522019-01-21 13:47:55 +0000303 if( strcmp(z,"max-stack")==0
304 || strcmp(z,"max-data")==0
305 || strcmp(z,"max-as")==0
306 ){
drh8ed07d12019-01-20 00:03:59 +0000307 struct rlimit x,y;
drh59765522019-01-21 13:47:55 +0000308 int resource = RLIMIT_STACK;
309 char *zType = "RLIMIT_STACK";
drh8ed07d12019-01-20 00:03:59 +0000310 if( i+1==argc ){
311 fprintf(stderr, "missing argument to %s\n", argv[i]);
312 exit(1);
313 }
drh59765522019-01-21 13:47:55 +0000314 if( z[4]=='d' ){
315 resource = RLIMIT_DATA;
316 zType = "RLIMIT_DATA";
317 }
318 if( z[4]=='a' ){
319 resource = RLIMIT_AS;
320 zType = "RLIMIT_AS";
321 }
drh8ed07d12019-01-20 00:03:59 +0000322 memset(&x,0,sizeof(x));
drh59765522019-01-21 13:47:55 +0000323 getrlimit(resource, &x);
drh8ed07d12019-01-20 00:03:59 +0000324 y.rlim_cur = atoi(argv[++i]);
325 y.rlim_max = x.rlim_cur;
drh59765522019-01-21 13:47:55 +0000326 setrlimit(resource, &y);
drh8ed07d12019-01-20 00:03:59 +0000327 memset(&y,0,sizeof(y));
drh59765522019-01-21 13:47:55 +0000328 getrlimit(resource, &y);
329 printf("%s changed from %d to %d\n",
330 zType, (int)x.rlim_cur, (int)y.rlim_cur);
drh8ed07d12019-01-20 00:03:59 +0000331 continue;
332 }
drh7e85e902019-02-20 19:06:16 +0000333#endif /* _WIN32 */
drhd811d842018-10-27 21:06:44 +0000334 }
drhb10a50e2019-01-13 20:23:34 +0000335 argv[j++] = argv[i];
drhd811d842018-10-27 21:06:44 +0000336 }
drhb10a50e2019-01-13 20:23:34 +0000337 argv[j] = 0;
drhd811d842018-10-27 21:06:44 +0000338 *pArgc = j;
drh65da2852018-10-27 00:47:33 +0000339 return 0;
340}
drhe65b9c62019-01-11 13:03:06 +0000341
342#ifdef STANDALONE
343/*
344** Read an entire file into memory. Space to hold the file comes
345** from malloc().
346*/
347static unsigned char *readFile(const char *zName, int *pnByte){
348 FILE *in = fopen(zName, "rb");
349 long nIn;
350 size_t nRead;
351 unsigned char *pBuf;
352 if( in==0 ) return 0;
353 fseek(in, 0, SEEK_END);
354 nIn = ftell(in);
355 rewind(in);
356 pBuf = malloc( nIn+1 );
357 if( pBuf==0 ){ fclose(in); return 0; }
358 nRead = fread(pBuf, nIn, 1, in);
359 fclose(in);
360 if( nRead!=1 ){
361 free(pBuf);
362 return 0;
363 }
364 pBuf[nIn] = 0;
365 if( pnByte ) *pnByte = nIn;
366 return pBuf;
367}
368#endif /* STANDALONE */
369
370#ifdef STANDALONE
371int main(int argc, char **argv){
372 int i;
drhe65b9c62019-01-11 13:03:06 +0000373 LLVMFuzzerInitialize(&argc, &argv);
374 for(i=1; i<argc; i++){
375 unsigned char *pIn;
376 int nIn;
377 pIn = readFile(argv[i], &nIn);
378 if( pIn ){
379 LLVMFuzzerTestOneInput((const uint8_t*)pIn, (size_t)nIn);
380 free(pIn);
381 }
382 }
drh0ba32342019-07-08 18:35:51 +0000383#ifdef RUSAGE_SELF
drhb10a50e2019-01-13 20:23:34 +0000384 if( eVerbosity>0 ){
drh59765522019-01-21 13:47:55 +0000385 struct rusage x;
drhb10a50e2019-01-13 20:23:34 +0000386 printf("SQLite %s\n", sqlite3_sourceid());
drh59765522019-01-21 13:47:55 +0000387 memset(&x, 0, sizeof(x));
388 if( getrusage(RUSAGE_SELF, &x)==0 ){
389 printf("Maximum RSS = %ld KB\n", x.ru_maxrss);
390 }
drhb10a50e2019-01-13 20:23:34 +0000391 }
drh0ba32342019-07-08 18:35:51 +0000392#endif
drhe65b9c62019-01-11 13:03:06 +0000393 return 0;
394}
395#endif /*STANDALONE*/